|Publication number||US7594193 B2|
|Application number||US 11/703,043|
|Publication date||Sep 22, 2009|
|Filing date||Feb 6, 2007|
|Priority date||Feb 6, 2007|
|Also published as||US20080189654|
|Publication number||11703043, 703043, US 7594193 B2, US 7594193B2, US-B2-7594193, US7594193 B2, US7594193B2|
|Inventors||Kasman E. Thomas|
|Original Assignee||Novell, Inc.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (8), Non-Patent Citations (3), Referenced by (16), Classifications (6), Legal Events (7)|
|External Links: USPTO, USPTO Assignment, Espacenet|
Generally, the present invention relates to computing environments having browsers with address bars (alternatively: URL bars, location bars, address fields, etc.). Particularly, it relates to usage of icons with the address bar, especially icons indicating a user's role as they visit web sites with the browser. Various features include icons with alternate states per user status, tool tips upon mouse-over gestures, and menus for user selection, to name a few.
Icons have been known for some time in association with address bars of browsers. In a typical application, an icon appears in an address bar in the form of a padlock, key, or other symbol suggesting security, whenever the visited website is configured as a secure website, such as with an https designation. In another application, icons appear as a proprietary logo, a trademark, a company brand, or as some other symbol suggesting the company of the website. For instance, the Yahoo!, Inc., website hosted at the URL (uniform resource locator) http:www.yahoo.com, for example, causes the display of an icon “Y!” in the address bar of the browser that is representative or identical to one of Yahoo!, Inc.'s trademarks. Also known in the art as “Favicons,” meaning favorite icons, the icons can also appear as a result of the designer of the website or by manipulation by users. They can further appear as icons in drop-down menus corresponding to bookmarks of “favorite” web pages, thereby providing users with visual cues for easy spotting when navigating the menus. They can even appear in tabbed document interfaces.
Regardless of application, all icons presently provide a visual indication relating exclusively to the host website. While some have functionality in the form of users being able to drop and drag them, into book-marked folders or “favorites” to create a link to the website (or particular web page), or “click” them to learn additional information, such as clicking on a padlock icon to learn about a secure website, none have additional functionality. None also have anything to do with the user visiting the website.
In that users often have many “roles,” such as in the context of an identity-managed computing environment in an employer's business (e.g., manager, employee, director, system administrator, etc.), users often need or desire to act in those roles when visiting various company resources, accessible regularly via a web browser. For instance, a user in the role of manager may need to access company-based computing applications to learn or investigate the financial pay information and benefits for direct-reporting employees. The same user may also have need to investigate the same application when in the role of employee to learn or investigate their own financial pay information and benefits. For at least this reason, the same user has multiple roles and multiple needs of visiting a common application. However, it is important for the user to understand what role they are in because inconvenience results if applications are visited when in the wrong role. For instance, users need to re-verify credentials or re-log-in, such as with username and password, to visit the application or website in a role different than their existing role, and this wastes time.
Accordingly, there is need in the art of user roles to readily cue or remind users of their present role. There is further need to do so in the context of visiting web sites or applications via browsers. To the extent icons are employed, functionality is important. It is also important that users have convenient mechanisms to change roles on the fly. In that many users already own and/or use a browser with an address bar for visiting web sites, it is further desirable to convert existing browsers to the type meeting the needs outlined above. Naturally, any improvements along such lines should further contemplate good engineering practices, such as relative inexpensiveness, stability, ease of implementation, low complexity, flexibility, etc.
The above-mentioned and other problems become solved by applying the principles and teachings associated with the hereinafter-described visual indication of user role in an address bar. In a basic sense, users log onto a computing device in a specific role and visit web sites or applications (hereafter collectively website(s)) in that role by way of a browser. The icons are not, however, indicative of the website being visited and focus on the user. This, as will be seen below, adds robustness heretofore unavailable.
In various embodiments, icons have forms suggestive of user roles as an employee, a manager, an administrator, an anonymous user, etc. Upon mousing-over the icon, tool tips are obtainable regarding a status of the role of the user. Menus of multiple icons are also available for the many roles of the user. Upon selection of one the icons of a menu, the selected icon appears in the address bar upon the user visiting the website in their new role. Altering the display of the icon to show different user-role status is also contemplated. Regardless of which icon is selected or why, its display reflects the role of the logged-in user at that moment, in that particular target system. For example, if the user logs in as an ordinary employee, the employee icons shows in the address bar. If the user navigates to the manager role, the icon changes to the manager icon. If the user has appropriate rights and is able to click into a page that allows them to act as an administrator, the icon changes to the administrator. And so forth.
Computer program products to retrofit existing browsers or provide a fully operational browser, for example, are available as a download or on a computer-readable medium for installation on a computing device of a user to support the visual indication of a role of the user.
These and other embodiments of the present invention will be set forth in the description which follows, and in part will become apparent to those of ordinary skill in the art by reference to the following description of the invention and referenced drawings or by practice of the invention. The claims, however, indicate the particularities of the invention.
The accompanying drawings incorporated in and forming a part of the specification, illustrate several aspects of the present invention, and together with the description serve to explain the principles of the invention. In the drawings:
In the following detailed description of the illustrated embodiments, reference is made to the accompanying drawings that form a part hereof, and in which is shown by way of illustration, specific embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention and like numerals represent like details in the various figures. Also, it is to be understood that other embodiments may be utilized and that process, mechanical, electrical, arrangement, software and/or other changes may be made without departing from the scope of the present invention. In accordance with the present invention, methods and apparatus for functional, visual indication of a user role in or near an address bar of a browser is hereinafter described.
With reference to
In either, storage devices are contemplated and may be remote or local. While the line is not well defined, local storage generally has a relatively quick access time and is used to store frequently accessed data, while remote storage has a much longer access time and is used to store data that is accessed less frequently. The capacity of remote storage is also typically an order of magnitude larger than the capacity of local storage. Regardless, storage is representatively provided for aspects of the invention contemplative of computer executable instructions, e.g., software, as part of computer program products on readable media, e.g., disk 14 for insertion in a drive of computer 17 or available as a download or reside in hardware, firmware or combinations in any or all of the depicted devices 15 or 15′.
When described in the context of computer program products, it is denoted that items thereof, such as modules, routines, programs, objects, components, data structures, etc., perform particular tasks or implement particular abstract data types within various structures of the computing system which cause a certain function or group of functions. In form, the computer program product can be any available media, such as RAM, ROM, EEPROM, CD-ROM, DVD, or other optical disk storage devices, magnetic disk storage devices, floppy disks, or any other medium which can be used to store the items thereof and which can be assessed in the environment.
In network, the computing device 15 or 15′ communicates with one or more other devices 20 via wired, wireless or combined connections 12 that are either direct 12 a or indirect 12 b. If direct, they typify connections within physical or network proximity (e.g., intranet). If indirect, they typify connections such as those found with the internet, satellites, radio transmissions, or the like, and are given indistinctly as element 13. In this regard, other contemplated items include servers, routers, peer devices, modems, T1 lines, satellites, microwave relays or the like. The connections may also be local area networks (LAN) and/or wide area networks (WAN) that are presented by way of example and not limitation. The topology is also any of a variety, such as ring, star, bridged, cascaded, meshed, or other known or hereinafter invented arrangement.
With reference to
For instance, Novell, Inc. (the Assignee of the present invention), provides its employees an innerweb accessible by an employee portal offering secure, personalized access from anywhere in the world. Upon logging-in, the users see and have access to a personalized web site which includes various applications and resources based on their role in the corporation. As described at http://www.novell.com/innerweb/, for example, a user in the role of salesperson has access to comprehensive views and customer information, as well as opportunity and contract management tools. This personalization then prevents employees from having to wade through screens of information to find that which is useful to them in their role. As before, however, users may have multiple roles and therefore have need of knowing their role, such as upon visual cuing, to which the instant invention is dedicated.
In a second step (step 44), the user visits a website on a host computing device (e.g., 20,
At step 46, an icon in or near the address bar of the browser is then displayed that indicates the role of the user as they visit the website. In this manner, users (with many roles, such as in the context of an employer's business) are visually cued to remind them of their role at the websites visited, especially since the websites often have different functionality according to different roles. Heretofore, this has never been done. Also, it is anticipated that the icon will consist of a word(s), letter(s), symbol(s), word(s) and symbol(s), etc., including various colors or not, directly indicative of the role of the user or suggestive of same. In this regard, a near endless variety of icons are available for use and skilled artisans will readily imagine examples. A few representative icons will be also shown below, but the invention is not so limited.
With reference to
With reference to
With reference to
Since users may be unfamiliar with the meaning of cancellation marks on an icon, or change in icon status from color to gray, or the like,
With reference to
With reference to
In a representative software implementation, especially for a corporate intranet scenario, the foregoing-described role-based icons could be stored in a central repository. A “mediator” process (which could involve a role manager) could fetch icons from the repository in response to requests by external entities. Web applications (external entities) could explicitly specify the use of the icon in a web page using traditional Favicon mechanisms, so for example, the following markup would be placed in the<head>section of an HTML page:
<link rel=“shortcut icon”href=“http://rolicon.server/request?rolicon.ico” type=“image/x-icon”>
During use, the markup could be generated by the web application at runtime, hard-coded into the page in static fashion, or inserted by an intercepting process (such as a servlet filter) dynamically, etc. The icon request is contained in the href attribute value. The href attribute would have a different value for an administrator role page versus an anonymous-user page versus an error page or an access-denied page, etc., so that the correct icon gets fetched and displayed to the user. The actual value of this attribute would reflect the final outcome of whatever role calculation(s) took place before the call came to generate the page.
In the above scenario, the icons are themselves under access control, so the user (in theory) can never see an icon they are not authorized to see. However, the system is failsoft in that failure to obtain an icon in no way limits the ability of the user to go on using the web application if they have logged in successfully. All that happens is that they do not see an icon in the address bar.
Appreciating many other embodiments are possible, it should be appreciated the claims are simplistically written such that an “address bar” as part of a browser also includes any software that exposes a URL address bar, such as is done in OpenOffice.org Writer, file-system browsers, etc. Strictly speaking, icons need not be tied to URLs, either, since URNs and URIs are often used in “address bars,” and there is no reason why they could not be juxtaposed against other kinds of locator strings as well (URLs, however, will be used in the claims to encompass all). So for example, current and future file-browsers, source-code browsers, directory browsers, and other non-web browsers could use this invention. Also, alternate embodiments contemplate visual and aural cues for icons, such as icon blinking or beeping, etc.) to indicate dynamic separation of duty (DSOD) related (or other) role conflicts.
Regardless of implementation, certain advantages of the invention over the prior art should now be readily apparent. For example, it is heretofore unknown to use icons indicative of the role of the user, and/or avoid use of icons reflective of the host computing device. In this manner, icons can be used in role-selection user interfaces (to aid a user in choosing a persona before logging onto a given system). They can also give realtime feedback to the user about his or her role at a place in a given application. Under this scenario, a user logs into a target system with a given set of credentials and a role-appropriate icon appears automatically in or near the address bar of the client application (Firefox browser, Internet Explorer (IE) browser, etc.), next to the URL. In this way, the user is provided with immediate visual feedback as to his or her role state. Further, the icons and their use described above: enable an unsophisticated user to discover role information about themself, quickly and naturally, via a GUI that associates a role symbol with a URL at the time the URL is being used; provide a way to reduce Help Desk calls in identity-managed environments (in that users know their role and need not inquire of the Help Desk); enable a user to select from available roles using a point-and-click (or other simple) UI gesture, in preparation for accessing a system, so that the client software can prefetch any resources (e.g., credentials stored in a keystore, cookie, etc.) that might be needed to access the system; provide a visual means of alerting a user to the expiration status of a particular set of credentials associated with a given role; and provide a UI mechanism by which a user can determine relationships between roles “at a glance.” Of course, these are only a few of the many advantages of the invention and skilled artisans will immediately recognize others.
Finally, one of ordinary skill in the art will recognize that additional embodiments are also possible without departing from the teachings of the present invention. This detailed description, and particularly the specific details of the exemplary embodiments disclosed herein, is given primarily for clarity of understanding, and no unnecessary limitations are to be implied, for modifications will become obvious to those skilled in the art upon reading this disclosure and may be made without departing from the spirit or scope of the invention. Relatively apparent modifications, of course, include combining the various features of one or more figures with the features of one or more of other figures.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US6202066||Nov 18, 1998||Mar 13, 2001||The United States Of America As Represented By The Secretary Of Commerce||Implementation of role/group permission association using object access type|
|US6452614 *||Apr 14, 1997||Sep 17, 2002||Siements Information And Communication Networks, Inc.||Organizing a user interface using different personae|
|US6732100||Mar 31, 2000||May 4, 2004||Siebel Systems, Inc.||Database access method and system for user role defined access|
|US7089243||Feb 20, 2002||Aug 8, 2006||Liping Zhang||Method and apparatus for a professional practice application|
|US20060218391||Jun 9, 2006||Sep 28, 2006||American Express Travel Related Services Company, Inc.||System and method for authenticating a web page|
|US20060218403||Mar 23, 2005||Sep 28, 2006||Microsoft Corporation||Visualization of trust in an address bar|
|US20070234218 *||Mar 28, 2007||Oct 4, 2007||Niresip Llc||User Interface For Variable Access Control System|
|US20070282947 *||May 31, 2006||Dec 6, 2007||Susanne Hupfer||Method and system for providing simultaneous awareness across multiple team spaces in real time|
|1||Novell, Inc. "Case Study," www.novell.com, Jan. 12, 2007, 6 pps.|
|2||Wikipedia, "Favicon," en.wikipedia.org/wiki/Favicon, Jan. 12, 2007, 3 pps.|
|3||Wikipedia, "URL Bar," en.wikipedia.org/wiki/Address-bar, Jan. 17, 2007, 2 pps.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US8261190 *||Apr 24, 2009||Sep 4, 2012||Burlington Education Ltd.||Displaying help sensitive areas of a computer application|
|US8271894 *||Sep 27, 2011||Sep 18, 2012||Google Inc.||Social computing personas for protecting identity in online social interactions|
|US8375331 *||Aug 26, 2011||Feb 12, 2013||Google Inc.||Social computing personas for protecting identity in online social interactions|
|US8775335||Aug 5, 2011||Jul 8, 2014||International Business Machines Corporation||Privacy-aware on-line user role tracking|
|US8914749||Jan 2, 2013||Dec 16, 2014||Google Inc.||Social computing personas for protecting identity in online social interactions|
|US9154467||Nov 26, 2014||Oct 6, 2015||Google Inc.||Social computing personas for protecting identity in online social interactions|
|US9436349 *||Mar 12, 2013||Sep 6, 2016||Microsoft Technology Licensing, Llc||Business solution user interface enabling interaction with reports|
|US9449195 *||Jan 22, 2010||Sep 20, 2016||Avow Networks Incorporated||Method and apparatus to perform online credential reporting|
|US20090271704 *||Apr 24, 2009||Oct 29, 2009||Burlington English Ltd.||Displaying help sensitive areas of a computer application|
|US20100192068 *||Jan 22, 2010||Jul 29, 2010||Avow Networks Incorporated||Method and apparatus to perform online credential reporting|
|US20120304073 *||May 27, 2011||Nov 29, 2012||Mirko Mandic||Web Browser with Quick Site Access User Interface|
|US20140282261 *||Mar 12, 2013||Sep 18, 2014||Microsoft Corporation||Business solution user interface enabling interaction with reports|
|US20150195345 *||Jan 9, 2014||Jul 9, 2015||Microsoft Corporation||Displaying role-based content and analytical information|
|USD732559 *||Mar 26, 2013||Jun 23, 2015||HouseHappy, Inc.||Display screen with graphical user interface for an online real estate platform|
|WO2014055468A2 *||Oct 1, 2013||Apr 10, 2014||Yandex Europe Ag||Method of and system for providing information to a user of a client device|
|WO2014055468A3 *||Oct 1, 2013||Jun 19, 2014||Yandex Europe Ag||Method of and system for providing information to a user of a client device|
|U.S. Classification||715/835, 715/738, 715/765|
|Feb 6, 2007||AS||Assignment|
Owner name: NOVELL, INC., UTAH
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:THOMAS, KASMAN E.;REEL/FRAME:018977/0333
Effective date: 20070131
|Nov 30, 2011||AS||Assignment|
Owner name: CPTN HOLDINGS LLC, WASHINGTON
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NOVELL,INC.;REEL/FRAME:027465/0227
Effective date: 20110427
Owner name: NOVELL INTELLECTUAL PROPERTY HOLDINGS, INC., WASHI
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CPTN HOLDINGS LLC;REEL/FRAME:027465/0206
Effective date: 20110909
|Dec 1, 2011||AS||Assignment|
Owner name: NOVELL INTELLECTUAL PROPERTY HOLDING, INC., WASHIN
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CPTN HOLDINGS LLC;REEL/FRAME:027325/0131
Effective date: 20110909
|Mar 22, 2013||FPAY||Fee payment|
Year of fee payment: 4
|Feb 11, 2016||AS||Assignment|
Owner name: RPX CORPORATION, CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NOVELL INTELLECTUAL PROPERTY HOLDINGS, INC.;REEL/FRAME:037809/0057
Effective date: 20160208
|Mar 9, 2016||AS||Assignment|
Owner name: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT, IL
Free format text: SECURITY AGREEMENT;ASSIGNORS:RPX CORPORATION;RPX CLEARINGHOUSE LLC;REEL/FRAME:038041/0001
Effective date: 20160226
|Mar 22, 2017||FPAY||Fee payment|
Year of fee payment: 8